diff options
author | GomathiselviS <gomathiselvi@gmail.com> | 2021-06-14 12:42:05 -0400 |
---|---|---|
committer | GitHub <noreply@github.com> | 2021-06-14 16:42:05 +0000 |
commit | eb46eb529a8bcfaeb5a7e736550d7cfb612b02d7 (patch) | |
tree | 0f5c70f399b184594d87090d5fba637cb8a5ddec /tests | |
parent | 4b7f5786c0260d43dcdde93e68695a829ab59adb (diff) | |
download | vyos.vyos-eb46eb529a8bcfaeb5a7e736550d7cfb612b02d7.tar.gz vyos.vyos-eb46eb529a8bcfaeb5a7e736550d7cfb612b02d7.zip |
Fix keyerror in firewall_rules when state=overridden (#172)
Fix keyerror in firewall_rules when state=overridden
Reviewed-by: https://github.com/apps/ansible-zuul
Diffstat (limited to 'tests')
-rw-r--r-- | tests/unit/modules/network/vyos/.test_vyos_firewall_rules.py.swp | bin | 0 -> 69632 bytes | |||
-rw-r--r-- | tests/unit/modules/network/vyos/test_vyos_firewall_rules.py | 10 |
2 files changed, 10 insertions, 0 deletions
diff --git a/tests/unit/modules/network/vyos/.test_vyos_firewall_rules.py.swp b/tests/unit/modules/network/vyos/.test_vyos_firewall_rules.py.swp Binary files differnew file mode 100644 index 0000000..b028e81 --- /dev/null +++ b/tests/unit/modules/network/vyos/.test_vyos_firewall_rules.py.swp diff --git a/tests/unit/modules/network/vyos/test_vyos_firewall_rules.py b/tests/unit/modules/network/vyos/test_vyos_firewall_rules.py index 7219443..682b2da 100644 --- a/tests/unit/modules/network/vyos/test_vyos_firewall_rules.py +++ b/tests/unit/modules/network/vyos/test_vyos_firewall_rules.py @@ -963,6 +963,13 @@ class TestVyosFirewallRulesModule(TestVyosModule): protocol="tcp", fragment="match-frag", disabled=False, + source=dict( + group=dict( + address_group="IN-ADDR-GROUP", + network_group="IN-NET-GROUP", + port_group="IN-PORT-GROUP", + ) + ), ), dict( number="2", @@ -1005,6 +1012,9 @@ class TestVyosFirewallRulesModule(TestVyosModule): "set firewall name V4-IN rule 1 protocol 'tcp'", "set firewall name V4-IN rule 1 description 'Rule 1 is configured by Ansible RM'", "set firewall name V4-IN rule 1 fragment 'match-frag'", + "set firewall name V4-IN rule 1 source group address-group IN-ADDR-GROUP", + "set firewall name V4-IN rule 1 source group network-group IN-NET-GROUP", + "set firewall name V4-IN rule 1 source group port-group IN-PORT-GROUP", "set firewall name V4-IN rule 1", "set firewall name V4-IN rule 1 action 'reject'", "set firewall name V4-IN rule 1 ipsec 'match-ipsec'", |